ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
History
21 Nov 2024, 04:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html - Mailing List, Third Party Advisory | |
References | () http://support.ntp.org/bin/view/Main/NtpBug3592 - Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1716665 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202007-12 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20200424-0002/ - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory |
26 Apr 2022, 17:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
|
CWE | CWE-346 | |
References |
|
|
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202007-12 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html - Mailing List, Third Party Advisory |
Information
Published : 2020-04-17 04:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11868
Mitre link : CVE-2020-11868
CVE.ORG link : CVE-2020-11868
JSON object : View
Products Affected
netapp
- vasa_provider_for_clustered_data_ontap
- fabric-attached_storage_8700
- all_flash_fabric-attached_storage_a400_firmware
- fabric-attached_storage_8300_firmware
- all_flash_fabric-attached_storage_8700_firmware
- hci_storage_node_firmware
- fabric-attached_storage_8300
- all_flash_fabric-attached_storage_8700
- virtual_storage_console
- solidfire
- data_ontap
- clustered_data_ontap
- hci_management_node
- fabric-attached_storage_a400
- hci_storage_node
- all_flash_fabric-attached_storage_8300
- fabric-attached_storage_a400_firmware
- fabric-attached_storage_8700_firmware
- all_flash_fabric-attached_storage_8300_firmware
- all_flash_fabric-attached_storage_a400
redhat
- enterprise_linux
ntp
- ntp
opensuse
- leap
debian
- debian_linux
CWE
CWE-346
Origin Validation Error